DocumentCode :
3314168
Title :
Man-in-the-middle attack on BB84 protocol and its defence
Author :
Wang Yong ; Wang Huadeng ; Li Zhaohong ; Huang Jinxiang
Author_Institution :
Coll. of Comput. & Control, Guilin Univ. of Electron. Technol., Guilin, China
fYear :
2009
fDate :
8-11 Aug. 2009
Firstpage :
438
Lastpage :
439
Abstract :
Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key distribution schemes. Some methods are suggested to defense against the attack by discovering the attack or handicapping the attack, and the security of BB84 protocol is analyzed.
Keywords :
cryptographic protocols; quantum cryptography; BB84 protocol; man-in-the-middle attack; quantum key distribution scheme; Cryptographic protocols; Cryptography; Detectors; Distributed computing; Educational institutions; Information security; Information technology; Physics; Quantum computing; Teleportation; BB84 protocol; man-in-the-middle attack; quantum cryptography; quantum key distribution;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-4519-6
Electronic_ISBN :
978-1-4244-4520-2
Type :
conf
DOI :
10.1109/ICCSIT.2009.5234678
Filename :
5234678
Link To Document :
بازگشت